Steps to create a Computer Disease

Viruses distributed through network systems

A virus can be described as piece of software that recreates itself by scanning networks, security slots and documents. Once it finds a machine that has a security hole, that copies on its own to that computer and starts replicating.

Infections can assail computers running any kind of operating system and any program, but they’re most likely to target Windows equipment. They also invade Macs, iOS and Google android devices, Linux machines and IoT gizmos.

E-mail malware

A virus’s infectious code is usually a part of an executable host record, such as an. EXE,. COM or perhaps. VBS method. This allows the computer virus to execute itself when the file can be opened or downloaded. The file could be attached to a document, sent over the network, or stored on the removable hard disk drive like a USB drive or hard disk.

Macro (Microsoft Office)

Another type of e-mail anti-virus is a macro, which is a system that’s stuck into Microsoft Word or Excel documents. When you open up an infected doc, it operates the virus’s malicious code, which can whatever it takes from encrypting your documents to sending out unsolicited mail messages to commandeered accounts.


A worm is yet another type of trojan that replicates itself on the internet. It runs for different machines that have a security opening and infects them. It uses up a whole lot of producing time and network bandwidth, and it at times causes important damage. Several famous worms include Code Red, which in turn caused chaos in 2001, and Slammer, which usually hit Home windows and MS SQL servers in 2003.

Leave a Comment

Your email address will not be published. Required fields are marked *

La Cafeteria is now open for Breakfast, Lunch & Dinner